default search action
29th AINA 2015: Gwangju, South Korea
- Leonard Barolli, Makoto Takizawa, Fatos Xhafa, Tomoya Enokido, Jong Hyuk Park:
29th IEEE International Conference on Advanced Information Networking and Applications, AINA 2015, Gwangju, South Korea, March 24-27, 2015. IEEE Computer Society 2015, ISBN 978-1-4799-7905-9
Session 1: Communications Network and Protocols I
- David Murray, Kevin Ong:
Experimental Evaluation of Congestion Avoidance. 1-8 - Marcus Sandri, Alan C. Silva, Lucio Agostinho Rocha, Fábio Luciano Verdi:
On the Benefits of Using Multipath TCP and Openflow in Shared Bottlenecks. 9-16 - A. H. Mohammed, Ahmed Shaharyar Khwaja, Alagan Anpalagan, Isaac Woungang:
Base Station Selection in M2M Communication Using Q-Learning Algorithm in LTE-A Networks. 17-22 - Andris Skrastins, Gunars Lauks:
Evaluation of AggSessAC Admission Control Solution to Improve Network Revenue. 23-28
Session 2: Ad Hoc and Mesh Networks I
- Ssowjanya Harishankar, Isaac Woungang, Sanjay Kumar Dhurandher, Issa Traoré, Shakira Banu Kaleel:
E-MAnt Net: An ACO-Based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks. 29-36 - Tetsuya Oda, Admir Barolli, Shinji Sakamoto, Leonard Barolli, Makoto Ikeda, Kazunori Uchida:
Implementation and Experimental Results of a WMN Testbed in Indoor Environment Considering LoS Scenario. 37-42 - Shinji Sakamoto, Tetsuya Oda, Leonard Barolli, Makoto Ikeda, Fatos Xhafa, Kazunori Uchida:
Application of WMN-SA Simulation System for WMN Node Placement in a Realistic Scenario. 43-47 - Xiaoying Zhang, Alagan Anpalagan, Lei Guo, Ahmed Shaharyar Khwaja:
Energy-Efficient Cooperative MAC Protocol Based on Power Control in MANETs. 48-53 - Zeeshan Hameed Mir, Woo Sung Jung, Young-Bae Ko:
Continuous Neighbor Discovery Protocol in Wireless Ad Hoc Networks with Sectored-Antennas. 54-61
Session 3: Wireless Sensor Networks I
- Masaru Eto, Ryo Katsuma, Morihiko Tamai, Keiichi Yasumoto:
Efficient Coverage of Agricultural Field with Mobile Sensors by Predicting Solar Power Generation. 62-69 - Oussama Ghorbel, Mohamed Abid, Hichem Snoussi:
A Novel Outlier Detection Model Based on One Class Principal Component Classifier in Wireless Sensor Networks. 70-76 - Naveed Ilyas, Nadeem Javaid, Zafar Iqbal, Muhammad Imran, Zahoor Ali Khan, Umar Qasim, Muhammad Shoaib:
AAEERP: Advanced AUV-Aided Energy Efficient Routing Protocol for Underwater WSNs. 77-83 - Kouhei Moriyama, Yongbing Zhang:
An Efficient Distributed TDMA MAC Protocol for Large-Scale and High-Data-Rate Wireless Sensor Networks. 84-91 - Ayesha Hussain Khan, Nadeem Javaid, Muhammad Imran, Zahoor Ali Khan, Umar Qasim, Noman Haider:
DYN-NbC: A New Routing Scheme to Maximize Lifetime and Throughput of WSNs. 92-97
Session 4: Distributed and Parallel Systems I
- Samia Loucif:
Performance Analysis of Traffic Bottleneck Induced by Concentration at K-Ary N-Cube NoC Routers. 98-105 - Michel Raynal:
A Simple Predicate to Expedite the Termination of a Randomized Consensus Algorithm. 106-111 - Masaki Kohana, Shusuke Okamoto:
A Server Selection Method for Web-Based Multiserver Systems. 112-117 - Yuanfang Chen, Xiaoming Li:
A Thread Merging Transformation to Improve Throughput of Multiple Programs. 118-125 - Anasthasia Agnes Haryanto, David Taniar, Kiki Maulana Adhinugraha:
Processing Group Reverse kNN in Spatial Databases. 126-133 - Norah Saleh Alghamdi, J. Wenny Rahayu, Eric Pardede:
Efficient Processing of Queries over Recursive XML Data. 134-142
Session 5: Communications Network and Protocols II
- Bruce Ndibanje, Hyunho Kim, Suhyun Park, Hoon-Jae Lee:
An Efficient and Provable Secret Shared Key Computation for Cryptographic Protocol Across Insecure Channel. 143-147 - Murat Karakus, Arjan Durresi:
A Scalable Inter-AS QoS Routing Architecture in Software Defined Network (SDN). 148-154 - Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
A Flexible Read-Write Abortion Protocol to Prevent Illegal Information Flow. 155-162 - Muhammad Babar Rasheed, Nadeem Javaid, Turki Ali Alghamdi, Sana Mukhtar, Umar Qasim, Zahoor Ali Khan, M. Haris Baidar Raja:
Evaluation of Human Activity Recognition and Fall Detection Using Android Phone. 163-170 - Chin-Yu Liu, Fang-Yie Leu, Jung-Chun Liu, Aniello Castiglione, Francesco Palmieri:
Heterogeneous Network Handover Using 3GPP ANDSF. 171-175
Session 6: Ad Hoc and Mesh Networks II
- Shrikant H. Talawar, Ramesh C. Hansdah:
A Protocol for End-to-End Key Establishment During Route Discovery in MANETs. 176-184 - Mahdieh Ahmadi, Mohammed Gharib, Fatemeh Ghassemi, Ali Movaghar:
Probabilistic Key Pre-Distribution for Heterogeneous Mobile Ad Hoc Networks Using Subjective Logic. 185-192 - Quang-My Tran, Arek Dadej:
Optimizing Cached Route Time-to-Live in Mobile Ad-Hoc Networks. 193-200 - Walayat Hussain, Farookh Khadeer Hussain, Omar Khadeer Hussain:
Transmitting Scalable Video Streaming over Wireless Ad Hoc Networks. 201-206 - Admir Barolli, Tetsuya Oda, Leonard Barolli, Fatos Xhafa, Vincenzo Loia, Kazunori Uchida:
Performance Analysis of WMN-GA Simulation System for Different WMN Architectures Considering OLSR. 207-214 - Vladi Kolici, Leonard Barolli, Shinji Sakamoto, Tetsuya Oda, Fatos Xhafa, Kazunori Uchida:
Optimization of Giant Component and Number of Covered Users in Wireless Mesh Networks: A Comparison Study. 215-222
Session 7: Wireless Sensor Networks II
- Ziad Serhan, Wafaa Bou Diab:
Energy-Efficient QoS Routing in Wireless Multimedia Sensor Networks. 223-230 - Siddharth Watwe, R. C. Hansdah:
Improving the Energy Efficiency of a Clock Synchronization Protocol for WSNs Using a TDMA-Based MAC Protocol. 231-238 - Arpan Sen, Shrestha Ghosh, Arinjoy Basak, Harsh Parsuram Puria, Sushmita Ruj:
Achieving Data Survivability and Confidentiality in Unattended Wireless Sensor Networks. 239-246 - Nachiketa Tarasia, Manas Ranjan Lenka, Amulya Ratna Swain:
Energy Efficient Extended Coverage in Wireless Sensor Networks. 247-254 - Hyun-Woo Kim, Eun-Ha Song, Jong Hyuk Park, Young-Sik Jeong:
Parallel Processing Simulator for Separate Sensor of WSN Simulator with GPU. 255-262
Session 8: Distributed and Parallel Systems II
- Fatos Xhafa, Victor Naranjo, Santi Caballé:
Processing and Analytics of Big Data Streams with Yahoo!S4. 263-270 - Dilawaer Duolikun, Tomoya Enokido, Hui-Huang Hsu, Makoto Takizawa:
Asynchronous Migration of Process Replicas in a Cluster. 271-278 - Tomoya Enokido, Makoto Takizawa:
Energy-Efficient Delay Time-Based Process Allocation Algorithm for Heterogeneous Server Clusters. 279-286 - Ningping Sun, Masataka Murakami, Youhei Yamashita, Tomonori Yagi:
TeleBuilder: A 3DCG Builder System for Multiplayers via Network. 287-293 - Yohei Akiyama, Yuji Kasai, Masaya Iwata, Eiichi Takahashi, Fumiaki Sato, Masahiro Murakawa:
Anomaly Detection of Solar Power Generation Systems Based on the Normalization of the Amount of Generated Electricity. 294-301
Session 9: Pervasive and Ubiquitous Computing I
- Bang Wang, Shengliang Zhou:
Location Search Based on Subarea Fingerprinting and Surface Fitting for Indoor Positioning System. 302-309 - Neil Y. Yen, Jason C. Hung:
User-Centric Contexts Sensing for Instant Information Seeking Support. 310-315 - Anubis Graciela de Moraes Rossetto, Carlos Oberdan Rolim, Valderi R. Q. Leithardt, Guilherme A. Borges, Cláudio Fernando Resin Geyer, Luciana Arantes, Pierre Sens:
A New Unreliable Failure Detector for Self-Healing in Ubiquitous Environments. 316-323 - Matteo Cristani, Erisa Karafili, Claudio Tomazzoli:
Improving Energy Saving Techniques by Ambient Intelligence Scheduling. 324-331 - Evangelos Pournaras, Izabela Moise, Dirk Helbing:
Privacy-Preserving Ubiquitous Social Mining via Modular and Compositional Virtual Sensors. 332-338
Session 10: Security and Privacy I
- Fang Liu, Wee Keong Ng, Wei Zhang:
Encrypted Gradient Descent Protocol for Outsourced Data Mining. 339-346 - Yuto Iso, Takamichi Saito:
A Proposal and Implementation of an ID Federation that Conceals a Web Service from an Authentication Server. 347-351 - Mahmood Ahmad, Zeeshan Pervez, Byeong Ho Kang, Sungyoung Lee:
O-Bin: Oblivious Binning for Encrypted Data over Cloud. 352-357 - Nuttachot Promrit, Anirach Mingkhwan:
Traffic Flow Classification and Visualization for Network Forensic Analysis. 358-364 - Thach V. Bui, Thuc Dinh Nguyen, Noboru Sonehara, Isao Echizen:
Efficient Authentication, Traitor Detection, and Privacy-Preserving for the Most Common Queries in Two-Tiered Wireless Sensor Networks. 365-372
Session 11: Wireless Sensor Networks III
- Tales Heimfarth, João Carlos Giacomin, João Paulo de Araujo:
AGA-MAC: Adaptive Geographic Anycast MAC Protocol for Wireless Sensor Networks. 373-381 - Subhasis Dash, Satya Sundar Mallick, R. C. Hansdah, Amulya Ratna Swain:
A Distributed Approach to Construct Hierarchical Structure for Routing with Balanced Energy Consumption in WSNs. 382-388 - M. Sajid, K. Khan, Umar Qasim, Zahoor Ali Khan, Subhan Tariq, Nadeem Javaid:
A New Linear Cluster Handling (LCH) Technique Toward's Energy Efficiency in Linear WSNs. 389-393 - K. Khan, M. Sajid, Shaharyar Mahmood, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid:
(LEACH)2: Combining LEACH with Linearly Enhanced Approach for Cluster Handling in WSNs. 394-399 - Rajoua Anane, Ridha Bouallegue, Kosai Raoof:
Extensive Simulation Performance Evaluation of MSK Scheme with Error Correcting Codes in Wireless Sensor Networks. 400-405
Session 12: Internet Computing and Web Applications
- Zhongqqiang Zhang, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai:
Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms. 406-413 - Fan Zhao, Yuhan Song, Fenlin Liu, Ke Ke, Jingning Chen, Xiangyang Luo:
City-Level Geolocation Based on Routing Feature. 414-419 - Akkarach Kawbunjun, Ubon Thongsatapornwatana, Woraphon Lilakiatsakun:
Framework of Marketing or Newsletter Sender Reputation System (FMNSRS). 420-427 - Yefeng Ruan, Lina Alfantoukh, Arjan Durresi:
Exploring Stock Market Using Twitter Trust Network. 428-433 - Ralph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem M. Hajj, Haïdar Safa:
A Framework for Secure Information Flow Analysis in Web Applications. 434-441 - Toshiyuki Haramaki, Hiroaki Nishino:
A Network Topology Visualization System Based on Mobile AR Technology. 442-447
Session 13: Pervasive and Ubiquitous Computing II
- Byeong-Ju Kim, Yun-Hong Noh, Do-Un Jeong:
Implementation of the Smart Chair System for Multi-functional Unconstrained Healthcare Monitoring. 448-452 - Kam-yiu Lam, Nelson Wai-Hung Tsang, Song Han, Joseph Kee-Yin Ng, Sze-Wei Tam, Ajit Nath:
SmartMind: Activity Tracking and Monitoring for Patients with Alzheimer's Disease. 453-460 - Danish Mahmood, Nadeem Javaid, Muhammad Imran, Zahoor Ali Khan, Umar Qasim, Mohammed Abdullah Alnuem:
On Data Fusion for Orientation Sensing in WBASNs Using Smart Phones. 461-467 - Vamsi Paruchuri, Aravind Kumar:
Detecting Driver Distraction Using Smartphones. 468-475 - Arcangelo Castiglione, Alfredo De Santis, Raffaele Pizzolante, Aniello Castiglione, Vincenzo Loia, Francesco Palmieri:
On the Protection of fMRI Images in Multi-domain Environments. 476-481
Session 14: Security and Privacy II
- Babatunde Ojetunde, Naoki Shibata, Juntao Gao, Minoru Ito:
An Endorsement-Based Mobile Payment System for a Disaster Area. 482-489 - Jorge Miguel, Santi Caballé, Fatos Xhafa, Václav Snásel:
A Data Visualization Approach for Trustworthiness in Social Networks for On-line Learning. 490-497 - Bruce Ndibanje, Hyunho Kim, Young-Jin Kang, Young-Sil Lee, Hoon-Jae Lee:
On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis. 498-505 - Young-Jin Kang, Hyunho Kim, Bruce Ndibanje, Younggoo Park, Hoonjae Lee:
Correlation Power Analysis Attack on the Ping Pong-128 Key Stream Generator. 506-509 - Hiroaki Kikuchi, Hideki Hashimoto, Hideo Yasunaga, Takamichi Saito:
Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies. 510-514
Session 15: P2P Systems
- Sujoy Mistry, Dibyanshu Jaiswal, Arijit Mukherjee, Nandini Mukherjee:
P2P-Based Service Distribution over Distributed Resources. 515-520 - Yi Liu, Donald Elmazi, Shinji Sakamoto, Leonard Barolli, Fatos Xhafa, Kazunori Uchida:
A Reliable System for JXTA-Overlay P2P Platform Considering Number of Authentic Files, Security and QoS Parameters. 521-526 - Kentaro Aburada, Yoshihiro Kita, Mirang Park, Naonobu Okazaki:
Content Access Control Scheme for P2P Networks Using a Reputation Value. 527-533 - Hiroki Nakayama, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Causally Ordered Delivery of Event Messages with Keyword Vectors in P2P Publish/Subscribe Systems. 534-541 - Atsushi Takeda, Takuma Oide, Akiko Takahashi, Takuo Suganuma:
Accurate Data Aggregation on Unstable Structured P2P Network. 542-549
Session 16: Security and Privacy III
- Fang Liu, Wee Keong Ng, Wei Zhang:
Encrypted Association Rule Mining for Outsourced Data Mining. 550-557 - Jianhua Yang, Yongzhong Zhang:
RTT-Based Random Walk Approach to Detect Stepping-Stone Intrusion. 558-563 - Atsuko Miyaji, Mazumder Rashed:
A New (n, 2n) Double Block Length Hash Function Based on Single Key Scheduling. 564-570 - Julian Schütte, Rafael Fedler, Dennis Titze:
ConDroid: Targeted Dynamic Analysis of Android Applications. 571-578 - Dennis Titze, Julian Schütte:
Apparecium: Revealing Data Flows in Android Applications. 579-586
Session 17: Agents and Intelligent Computing
- Max Talanov, Jordi Vallverdú, Salvatore Distefano, Manuel Mazzara, Radhakrishnan Delhibabu:
Neuromodulating Cognitive Architecture: Towards Biomimetic Emotional AI. 587-592 - Haïdar Safa, Nadine Ahmad:
Tabu Search Based Approach to Solve the TAs Reconfiguration Problem in LTE Networks. 593-599 - Chia-Hsing Cheng, Yung-Fa Huang, Hsing-Chung Chen, Tsung-Yu Yao:
Neural Network-Based Estimation for OFDM Channels. 600-604 - Nan Jiang, Tao Wan, Lingfeng Liu, Jin Li:
Strength-Constrained Weighted Evolution Model for Wireless Sensor Networks. 605-610
Session 18: Cloud, Data Centers and Services Computing I
- Giang Son Tran, Alain Tchana, Daniel Hagimont, Noel De Palma:
Cooperative Resource Management in a IaaS. 611-618 - Luís Alexandre Rocha, Fábio Luciano Verdi:
A Network-Aware Optimization for VM Placement. 619-625 - Yaling Tao, Yongbing Zhang, Yusheng Ji:
Efficient Computation Offloading Strategies for Mobile Cloud Computing. 626-633 - Amin M. Khan, Felix Freitag, Smrati Gupta, Victor Muntés-Mulero, Jacek Dominiak, Peter Matthews:
On Supporting Service Selection for Collaborative Multi-cloud Ecosystems in Community Networks. 634-641 - Mennan Selimi, Felix Freitag, Roger Pueyo Centelles, Agustí Moll, Luís Veiga:
TROBADOR: Service Discovery for Distributed Community Network Micro-Clouds. 642-649 - Andre Silva, Nelson S. Rosa:
FIrM: Functional Middleware with Support to Multi-tenancy. 650-657
Session 19: Scalable Computing and IoT
- Rudyar Cortés, Xavier Bonnaire, Olivier Marin, Pierre Sens:
Free Split: A Write-Ahead Protocol to Improve Latency in Distributed Prefix Tree Indexing Structures. 658-665 - Ihsan Ullah, Nadeem Javaid, Muhammad Imran, Zahoor Ali Khan, Umar Qasim, Mohammed Abdullah Alnuem, Mudassar Bashir:
A Survey of Home Energy Management for Residential Customers. 666-673 - Tomoya Kawakami, Tomoki Yoshihisa, Yutaka Yanagisawa, Masahiko Tsukamoto:
A Rule Processing Scheme Using the Rete Algorithm in Grid Topology Networks. 674-679 - Deepali Arora, Kin Fun Li, Stephen W. Neville:
Consumers' Sentiment Analysis of Popular Phone Brands and Operating System Preference Using Twitter Data: A Feasibility Study. 680-686 - Mohammad Aazam, Eui-Nam Huh:
Fog Computing Micro Datacenter Based Dynamic Resource Estimation and Pricing Model for IoT. 687-694 - Sun Park, ByungRae Cha, JongWon Kim:
Preparing and Inter-Connecting Hyper-Converged SmartX Boxes for IoT-Cloud Testbed. 695-697
Session 20: Security and Privacy IV
- Yohei Kaneko, Takamichi Saito, Hiroaki Kikuchi:
Cryptographic Operation Load-Balancing between Cryptographic Module and CPU. 698-705 - Dan Jiang, Kazumasa Omote:
An Approach to Detect Remote Access Trojan in the Early Stage of Communication. 706-713 - Hiroshi Yamaguchi, Masahito Gotaishi, Phillip C.-Y. Sheu, Shigeo Tsujii:
Privacy Preserving Data Processing. 714-719 - Masahiro Sakuma, Yoshihiro Kita, Kentaro Aburada, Mirang Park, Naonobu Okazaki:
Study of Filter Sharing Method Using Virtual Peers in P2P Networks. 720-726 - Andrew Springall, Christopher DeVito, Shou-Hsuan Stephen Huang:
Per Connection Server-Side Identification of Connections via Tor. 727-734
Session 21: Vehicular and Cognitive Radio Networks
- Nimish Sharma, Danda B. Rawat, Bhed Bahadur Bista, Sachin Shetty:
A Testbed Using USRP(TM) and LabView(R) for Dynamic Spectrum Access in Cognitive Radio Networks. 735-740 - Goshi Sato, Noriki Uchida, Yoshitaka Shibata:
Performance Evaluation of Software Defined and Cognitive Wireless Network Based Disaster Resilient System. 741-746 - Aboobeker Sidhik Koyamparambil Mammu, Josef Jiru, Unai Hernández-Jayo:
Cluster Based Semantic Data Aggregation in VANETs. 747-753 - Taiki Honda, Makoto Ikeda, Seiichiro Ishikawa, Leonard Barolli:
A Message Suppression Controller for Vehicular Delay Tolerant Networking. 754-760
Session 22: Cloud, Data Centers, and Services Computing II
- Emna Hachicha, Walid Gaaloul:
Towards Resource-aware Business Process development in the Cloud. 761-768 - Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa:
Establishment of Virtual Policy Based Network Management Scheme by Load Experimets in Virtual Environment. 769-776 - Abdalla Artail, Karim Frenn, Haïdar Safa, Hassan Artail:
A Framework of Mobile Cloudlet Centers Based on the Use of Mobile Devices as Cloudlets. 777-784 - Asma Alkalbani, Akshatha Shenoy, Farookh Khadeer Hussain, Omar Khadeer Hussain, Yanping Xiang:
Design and Implementation of the Hadoop-Based Crawler for SaaS Service Discovery. 785-790 - ByungRae Cha, Sun Park, Sujeong Shim, JongWon Kim:
Secured mVoIP Service over Cloud and Container-Based Improvement. 791-795
Session 23: Security and Privacy V
- Danilo Valeros Bernardo, Bee Bee Chua:
Introduction and Analysis of SDN and NFV Security Architecture (SN-SECA). 796-801 - Karel Heurtefeux, Ochirkhand Erdene-Ochir, Nasreen Mohsin, Hamid Menouar:
Enhancing RPL Resilience Against Routing Layer Insider Attacks. 802-807 - Jinyang Li, Jun Ye:
Secure Outsourcing of Multiple Modular Exponentiations. 808-811 - Taeyoung Jung, Jaein Kim, Junyoung Park, Kangbin Yim:
Novel Approaches to Protecting Block Ciphers by Distributing Round Keys. 812-816 - Hyeryun Lee, Kyunghee Choi, Kihyun Chung, Jaein Kim, Kangbin Yim:
Fuzzing CAN Packets into Automobiles. 817-821
Session 24: Mobile Networks
- Miho Kawamoto, Tetsuya Shigeyasu:
Message Relay Decision Algorithm to Improve Message Delivery Ratio in DTN-Based Wireless Disaster Information Systems. 822-828 - Qiao Kong, Bang Wang:
Adaptive Cell Range Expansion for Energy Cost Saving in Heterogeneous Cellular Networks with Hybrid Energy Supplies. 829-836 - Kenta Mori, Sho Hatakeyama, Hiroshi Shigeno:
DCLA: Distributed Chunk Loss Avoidance Method for Cooperative Mobile Live Streaming. 837-843 - Mamun I. Abu-Tair, Saleem N. Bhatti:
Upgrading 802.11 deployments: A Critical Examination of Performance. 844-851 - Woonghee Lee, Mungyu Bae, Hyunsoon Kim, Suk Kyu Lee, Hwangnam Kim:
MACoD: Mobile Device-Centric Approach for Identifying Access Point Congestion. 852-859 - Vamsi Paruchuri, Arjan Durresi:
Stateless Adaptive Reliable Broadcast Protocol for Heterogeneous Wireless Networks. 860-867
Session 25: Multimedia Systems and Applications
- Misaki Hagino, Yuki Tayama, Ken-ichi Okada:
A Triage Training System with Dynamic Scenario Change. 868-875 - Motoo Ino, Koji Hashimoto, Yoshitaka Shibata:
An Adaptive Video Quality Control Method in Wireless Network Environment. 876-881 - Yusaku Maki, Satoshi Gondo, Tomoo Inoue, Ken-ichi Okada:
Travel Agency Desk Support System Using Interest Degree. 882-889 - Hiroyuki Endo, Shinnosuke Furuya, Ken-ichi Okada:
MR Manual and Authoring Tool with Afterimages. 890-895 - Feng Xie, Zhen Chen, Jiaxing Shang, Wen-Liang Huang, Jun Li:
Item Similarity Learning Methods for Collaborative Filtering Recommender Systems. 896-903 - Junghoon Park, Taeyoung Jung, Kangbin Yim:
Implementation of an Eye Gaze Tracking System for the Disabled People. 904-908
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.